WannaCry Ransomware

WannaCry Ransomware

Starting early Friday morning, May 12, ransomware attacks using the Eternal Blue exploit for Microsoft windows were executed across businesses in hundreds of countries. This new ransomware variant, known as WannaCry, WCry, WannaCrypt, or Wanna Decryptor, targets and exploits a Windows SMBv1 vulnerability that was patched by Microsoft in March in Security Bulletin MS17-010. Other infection vectors include Remote Desktop Protocol (RDP) compromise and phishing emails.

Mediware has been working diligently to make sure all internal systems have had this vulnerability addressed. At this time, Mediware has no evidence that the vulnerability has been exploited on internal or customer systems.

Mediware has taken preventive measures to ensure our infrastructure, which consists of all our servers, devices, and customer data, are adequately protected from this attack. Mediware deploys an in-depth defensive strategy that helps mitigate and minimize any threat vectors such as this one. In addition to a robust and vigorous patching strategy, the following layers of defense are and have been in place to protect all data and all applications.